SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How can you secure file transfers across a network?
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
2. What OSs disallow the uninstalliatin of IPV6?
Problem history but also application installation history.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Windows Vista - Window 7 and Server 2008.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
3. What does Scanstate /p do?
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
4. What do you provide to Scanstate to prevent certain system settings from being migrated?
Use IPV6 Unique Local Addresses.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
A CONFIG.XML file
Yes
5. What is terminal server network level authentication?
On the zone file of the DNS server in the DNS manager.
Use SYNC Center
It governs remote access and a user must meet the conditions of at least one of the policies.
The requesting of user authentication prior to connecting to the terminal server. This completes the user aoth before reaching the logon screen making the server more secure. This helps fight Denial of Service attacks - malicious users/software.
6. What is Aero Peek?
From the Network Policy Access Services role in system manager.
Only Windows Vista can be directly upgraded to Windows 7 and only if you upgrade within the same processor architecture (X86 or X84).
Hovering over a taskbar icon shows thumbnail of that program. Hovering over the thumbnail shows a preview of that program in full view. Aero Peek also refers to the "Show desktop" button to the far right of the new taskbar.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
7. Can configure a GPO to prevent all removable storage devices?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. What do wireless access points need in order for NAP to enforce wireless access policy (WAP)?
They relay the status on polices to the Security center for NAP to validate the system to use the network.
They need to be configured us use 802.1x RADIUS authentication
Either from wbadmin or windows server backup.
No they are disabled
9. What is an example of a exceptions to rule?
WPA2 and 802.1x but require EAP-TLS to be enable.
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
WIndows Update Server
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
10. What should you modify of the NAP Agent client service if the computer needs to prove health status?
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
Delegate permission by configuring the dacl of the zone file.
11. NAP can be configured to ____________.
On the zone file of the DNS server in the DNS manager.
It governs remote access and a user must meet the conditions of at least one of the policies.
Enforce IPSEC on the network
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
12. What is BranchCache?
Use SYNC Center
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
13. What are the two ways that you can take advantage of system protection?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. How can you delete route table entries?
IN the WindowsUpdateClient log in the system log portion of event viewer.
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
Through a GPO under Application Control Policies in the Computer Security Settings Node.
Use the route delete command.
15. Windows 9x ___________ an automatic update client.
WINRM QUICKCONFIG.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
You can allow by adding the device vendor's GUID to the allow list in a GPO.
Does not have
16. When you install an application in Windows Virtual PC - Windows XP Mode - where does it automatically creates a Windows 7 Start Menu Shortcut under?
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
On a core server
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
17. Can DISM can apply an answer file to an offline image?
Yes
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
WPA2 and 802.1x but require EAP-TLS to be enable.
It improves performance
18. What does Reliability Monitor display?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
Problem history but also application installation history.
Uncheck IPV6 from the network properties.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
19. What is a NPS server?
Use the BCDEDIT.EXE command
Configure the enforcement points as RADIUS clients.
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
Does not
20. What OSs are all Windows Games installed on?
Windows 7 Enterprise and Ultimate Editions
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Setup a GlobalNames zone.
Windows PE and Windows.old.
21. What requirements must your system must meet to use BranchCache?
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
Does not
Computer certificates be installed on client computers
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
22. What are WIM files used for?
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
Creates a bootable CD that runs the Windows Recovery Environment (WRE)
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
23. How do you reload an active directory integrated zone from a ad database?
Us edit dnscmd /zoneupdatefromdns command.
Modify/Create a GPO
A type of port forwarding that allows public network computers on a Private network through nat devises.
A WDDM driver for the graphics card and a Windows Experience index of 3.0 or greater.
24. What does DISM /Get-Drivers do?
Used to get a list of installed 3rd party drivers
DHCP server cannot assign an ip address
Enterprise Admins
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
25. How do you configure client computers to use a WSUS server as the source for Windows Update?
It is the authentication header protocol and digitally sign packets but not encrypt them.
Configure a GPO to modify the computers location to look for updates.
Modify/Create a GPO
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
26. How do you set a DNS server to a cache only DNS server?
Only a local administrator
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Use the net sh command to configure the proper ports for remote management.
Delete all the zone files or reinstall the DNS service.
27. Use ocsetup instead of servermanagercmd.exe _________.
On a core server
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
Can be configured through a GPO
28. What is System protection?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. How do you view failed WSUS updates on the client PC?
IN the WindowsUpdateClient log in the system log portion of event viewer.
Windows Aero was revised to be more touch-friendly.
The local security logs.
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
30. How do you connect to a wireless access point is not broadcasting its SSID?
DHCP server cannot assign an ip address
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
By creating or modifying a wireless connection in Network and Sharing Center.
31. What is the command to set a forwarding computer for event log forwarding?
WINRM QUICKCONFIG.
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
Uncheck IPV6 from the network properties.
Clear the content being cached
32. What does Scanstate /EFS:COPYRAW do?
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Migrates EFS encrypted files?
33. Why would a secondary DNS server stop responding to client queries?
Use the route delete command.
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
34. What protocol does NAP enforce when used in 802.1x authentication?
Place unhealthy computers in a quarantined network and auto-remediate clients.
The ICMP protocol.
It is the authentication header protocol and digitally sign packets but not encrypt them.
EAP protocol.
35. How do you have a Firewall rule apply only to a specific computer?
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
Through a GPO under Application Control Policies in the Computer Security Settings Node.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
36. What mode is BranchCache configured for branch offices with fewer than 50 users?
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
A .WFW file
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
37. What does PNPUTIL.EXE do?
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
No
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
38. What are hard disk quotas?
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
they are enforced and will not allow a user to exceed the space limit.
First the local link address sends a router discovery packet (Router Solicitation message). If the router request is received then a Public address corrosponding to the global or unique local address prefix in the message.
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
39. What do wireless access point need to be configured with to to preform 802.1x authentication?
Only a local administrator
They must be configured with the ip addresses of the radius server.
Backups of the full system including all critical volumes (volumes that contain operating system state).
Perform an offline migration
40. What does "wbdadmin -startbackup -allcritical" do?
Backups of the full system including all critical volumes (volumes that contain operating system state).
Distributed Cache mode. In this mode - local Windows 7 clients keep a copy of the content and make it available to other authorized clients that request the same data. This eliminates the need to have a server in the branch office. However - unlike H
Windows 7 Ultimate.
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
41. What protocol does Ping uses?
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
The ICMP protocol.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
A OOBE ready and will be booted into Windows Welcome
42. What does Credential Manager allows you to store?
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
Windows 7 Ultimate.
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
Anew vpn protocol that uses SSL (port 443) for encryption.
43. How do you quickly restore a file from backup?
Yes
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
44. What is SSTP?
Cannot be in different domains
Anew vpn protocol that uses SSL (port 443) for encryption.
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
Use the route delete command.
45. What firewall profile is configured for AD domain computers?
WPA-Enterprise (radius authentication)
Use AD integrated zones so the clients can update to more than one DNS server.
The domain profile not the public or private.
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
46. What is Aero Snap?
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
It will display driver signing status
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.
47. How do you create a VPN connection?
Use the "Connect to a Workplace" option
A network location.
Internet printing protocol. Used for connecting to printers via web browser.
It designates an authoritative DNS server - not the soa record.
48. How do you need to configure the NAP enforecment points if using in conjenction with NPS?
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
A suite of tools that allow administrators to understand - control - and manage the quantity and types of data stored on the servers.
Configure the enforcement points as RADIUS clients.
A OOBE ready and will be booted into Windows Welcome
49. How do you test the ip connectivity on IPV6?
By unbinding the DHCP protocol from the nic attached to the subnet.
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
Ping the Link Local Address (FE80 Address)
50. What is DiskPart?
Does not
Windows PE and Windows.old.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Install Windows Installer Packages (.MSI) files. You can script the installation.